Aspects and implication of Cyberspace Surveillance Technologies

The three most thought about aspects of a surveillance society, would be; from one side it protects and monitors, but on the other hand in order to achieve its protection functions, certain boundaries of privacy are crossed. Some would argue that it is governments demand for more power over people, a disciplinary technique; the fact that people are more likely to behave if they had known they had been under a certain amount of supervision. But not all of the time can this be beneficial to them; questions are asked of whether the success of it, rationalize for existence radical surveillance technologies. As much as it acts as a nation protector, and crime preventer, it is also, on a massive scale, a privacy invader. In this essay I will…show more content…

The concept of the ‘Panopticon’ as a programme in aids of surveillance was developed by Jeremy Bentham and the idea behind this, is that behaviour is altered by the knowledge that surveillance is twenty-four seven. Originally designed for prison inmate, the aim was to induce their “state of conscious and permanent visibility that assures the automatic functioning of power” (Foucault, 1979: p.201). Often power is mentioned as one of the outcomes of surveillance, in theory surveillance should be, partly encouraged for the gain of power. It is regularly considered that before the event of nine eleven, surveillance programmes did not touch a lot of the aspects of life, and with the innovation in surveillance technologies came to a rose, it is not only necessary to carry out these for security reasons but also because its possible to. Bentham suggested the “power should be visible” but at the same time “unverifiable” (cited in Foucault, 1979: p.201), this practice is carried out until to day, Bentham has supposed a theory where people are afraid of what is out there, but are unable to anticipated, the amount, the size or anything, all they know is that, something is there, preying watching. Whenever internet is accessed within an institutional ground, whether it is university or work place, people somehow would always detect the notion of being supervised, not only it is a share

Related Documents

Though Kozinski and the panel of judges later accepted a revised monitoring policy that limits web-surfing tracking but forbids email reviews, “judicial retreat from unrestricted monitoring”2 bears significant implications for the 14 million American workers subject to continuous surveillance.3
Recent judicial sentiments for workers’ privacy contradict the historic apathy employees received from federal and state judges. The notable case of Smyth v. Pillsbury Company exemplifies an…

Surveillance cameras provide people with a sense of security. It is important for people to feel secure because they won’t be able to enjoy a single day that goes by without feeling secure. Most importantly, children need to be kept safe and that can primarily or most efficiently be done with surveillance cameras and preventing unfortunate event from happening. In addition, surveillance cameras can prevent individuals with negative intentions to enter a harmless community.
Surveillance can deter…

Another claim made about the nature of identity in cyberspace is the chance to act in a way in which you would not in reality. An online example of this is in Ehrenreich's, "Put Your Pants On, Demonboy." The first time she signed on to AOL and wandered in it was in the chat rooms because she never explored that area before. She noticed that in the chat rooms, people were conversing, but were also debating, insulting, and arguing with each other. Her article was based on an online character named…

dependent’ were two factors that determined surveillance as a controlling and monitoring phenomena to emerge. Surveillance became a ‘justified’ anti-fraud measure and a permanent method of control and reassurance for the government that the recipient is focusing on going back on the job market and become the worthy, taxpayer citizen.
According to Bernard-Wills David in Surveillance and Identity (2013), researches about the history and origin of the surveillance have emerged from a variety of interdisciplinary…

Nord, McCubbins, & J. Nord, 2006, p. 73). Surveillance has grown to even higher numbers since 2006 with more advances in technology of software and the implementation of more Information Technology (IT) employees. Any employee who has access to the internet or to the company network is under surveillance. The hardware of their computer system is monitored by every keystroke that is made. “Packet-sniffing software can intercept, analyze, and archive all communications on a network, including employee…

This right has two aspects:-
(1) The general law of privacy which affords a tort action for damages resulting from an unlawful invasion of privacy and
(2) The constitutional recognition given to the right to privacy which protects personal privacy against unlawful governmental invasion.
But as we all are aware of that Right to privacy is not enumerated as a fundamental right in our Constitution but has been many times interpreted from Article 21.
The concept of privacy is also present in the…

normative guidelines, educational programs or legal advice—which might apply to whole classes of comparable cases." (http://www.wolfson.ox.ac.uk/~floridi/ie.htm#1)
Educational Issues:
Computers are the tools needed to access many kinds of technology. Computers must be made available to link people and formal systems of information. In a few years most of us will get information and daily news over digital networks. We may even use the networks to acquire an education. Therefore, universal access…

executive branch powers authorize warrantless surveillance in the interests of national security"(Joyce par. 1).
Many believe that the NSA's surveillance is constitutional. According to Senator Feinstein, who chairs the Intelligence Committee, this surveillance is a life saver : "New bombs are being devised. New terrorists are emerging, new groups, actually, a new level of viciousness. We need to be prepared"(Knickerbocker par. 17). Under NSA surveillance, people feel safer from crime and they feel…

a person can’t be monitored. The only places in the work place in most companies that cannot be monitored are place in which a person physical privacy can be violated, but everywhere else in the workplace is open for monitoring.
Electronic Surveillance Page 2
Explain whether it makes a difference if an employee is in an open area of in an enclosed office. There is a huge difference in open area office and enclosed offices. Employees who work in open area offices or shared offices are subject…

E-commerce is one concept that drew people to cyberspace for convenience of conducting transactions online for both the customers and businesses for a bottom-line into the billions of dollars (Hang, 2000; Kshetri, 2010).
The space in cyberspace refers the spatial environment of the internet resources contained such as the Uniform Resource Locator (URL), domain names, email accounts, or virtual worlds (Fairfield, 2005). A quick comparison between a chat room and a conference room or the website URL…